Conferences

Search results

    TitleConferenceSpeaker(s)
    Password Managers: Attacks and DefensesUSENIX Security '14David Silver, Suman Jana, Dan Boneh, Eric Chen, Collin Jackson
    From the Aether to the Ethernet—Attacking the Internet using Broadcast Digital TelevisionUSENIX Security '14Yossef Oren, Angelos D. Keromytis
    When Governments Hack Opponents: A Look at Actors and TechnologyUSENIX Security '14William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson
    DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic ReuseUSENIX Security '14Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu
    Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing WorkersUSENIX Security '14Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao
    Cardinal Pill Testing of System Virtual MachinesUSENIX Security '14Hao Shi, Abdulla Alwabel, Jelena Mirkovic
    BareCloud: Bare-metal Analysis-based Evasive Malware DetectionUSENIX Security '14Dhilung Kirat, Giovanni Vigna, Christopher Kruegel
    Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted MalwareUSENIX Security '14Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg Wiseman, Phillipa Gill, Ronald J. Deibert
    Understanding the Dark Side of Domain ParkingUSENIX Security '14Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang
    Towards Detecting Anomalous User Behavior in Online Social NetworksUSENIX Security '14Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Balachander Krishnamurthy, Alan Mislove
    TapDance: End-to-Middle Anticensorship without Flow BlockingUSENIX Security '14Eric Wustrow, Colleen M. Swanson, J. Alex Halderman
    The Long “Taile” of Typosquatting Domain NamesUSENIX Security '14Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich
    Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket TransportUSENIX Security '14Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson
    Effective Attacks and Provable Defenses for Website FingerprintingUSENIX Security '14Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg
    On the Feasibility of Large-Scale Infections of iOS DevicesUSENIX Security '14Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee
    A Large-Scale Analysis of the Security of Embedded FirmwaresUSENIX Security '14Andrei Costin, Jonas Zaddach, Aurélien Francillon, Davide Balzarotti
    An Internet-Wide View of Internet-Wide ScanningUSENIX Security '14Zakir Durumeric, Michael Bailey, J. Alex Halderman
    XRay: Enhancing the Web’s Transparency with Differential CorrelationUSENIX Security '14Mathias Lécuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, Roxana Geambasu
    Mimesis Aegis: A Mimicry Privacy Shield–A System’s Approach to Data Privacy on Public CloudUSENIX Security '14Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva
    Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin DosingUSENIX Security '14Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart
    Privee: An Architecture for Automatically Analyzing Web Privacy PoliciesUSENIX Security '14Sebastian Zimmeck, Steven M. Bellovin
    Green Lights Forever: Analyzing the Security of Traffic InfrastructureWOOT '14Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, J. Alex Halderman
    A Bayesian Approach to Privacy Enforcement in SmartphonesUSENIX Security '14Omer Tripp, Julia Rubin
    Exit from Hell? Reducing the Impact of Amplification DDoS AttacksUSENIX Security '14Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz
    Hulk: Eliciting Malicious Behavior in Browser ExtensionsUSENIX Security '14Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson

Pages